Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2010-0395
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
OpenOffice.org 2.x and 3.0 before 3.2.1 allows user-assisted remote attackers to bypass Python macro security restrictions and execute arbitrary Python code via a crafted OpenDocument Text (ODT) file that triggers code execution when the macro directory structure is previewed..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 9.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:* |
Yes
|
2.0.0 | 3.2.1 |
References
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042468.html
- http://www.vupen.com/english/advisories/2010/1369
- http://ubuntu.com/usn/usn-949-1
- http://secunia.com/advisories/40084
- http://www.vupen.com/english/advisories/2010/1350
- http://secunia.com/advisories/40104
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042534.html
- https://bugzilla.redhat.com/show_bug.cgi?id=574119
- http://secunia.com/advisories/40070
- http://www.openoffice.org/security/cves/CVE-2010-0395.html
- http://www.vupen.com/english/advisories/2010/1366
- http://www.redhat.com/support/errata/RHSA-2010-0459.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042529.html
- http://secunia.com/advisories/40107
- http://www.vupen.com/english/advisories/2010/1353
- http://www.debian.org/security/2010/dsa-2055
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://www.us-cert.gov/cas/techalerts/TA10-287A.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:221
- http://www.vupen.com/english/advisories/2010/2905
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://secunia.com/advisories/60799
- http://secunia.com/advisories/41818
- http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1